Learning Path

Scan container images for vulnerabilities

Learn about container basics, security threat vectors, best practices, and how to scan your own images

Overview

This learning path provides an overview of container images, threat vectors to consider for a containerized system, and best practices for securing container images. It then demonstrates the use of a container image scanning application and how to take actions to remediate vulnerabilities discovered in a container image.

Skill level

Beginner to Intermediate

Estimated time to complete

It should take you approximately 40 minutes to complete this learning path.

Learning objectives

This learning path covers the following topics:

  • Containerized system threat vectors
  • Container image security best practices
  • Vulnerability scanning and a remediation use case